Application method of specific mark recognizable based on computer vision perception
A computer vision and application method technology, applied in computing, data processing applications, instruments, etc., can solve problems such as two-dimensional code application security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0014] A payment two-dimensional code application method and an electronic payment system realizing the application method
[0015] The two-dimensional code contains payment object, payment amount, etc., and these contents need to be verified before they can be applied. The electronic payment system that realizes the payment two-dimensional code application method first verifies whether the content is correct according to the verification rules after scanning the code for identification legitimate. The verification rule (agreed in advance and known to the system) is to verify the verification code based on the payment object and payment amount information (similar to the last digit of the ID card number, which is calculated based on the previous information. If the collected If the two parts of the number do not match, the ID number is wrong), if it fails to pass the verification, it means that the content has been tampered with. If it passes, it will display the payment obje...
Embodiment 2
[0017] A payment two-dimensional code application method and a non-electronic payment system realizing the application method
[0018] The two-dimensional code contains content such as the payment object, payment amount, payment platform entrance, etc., and these contents need to be verified before they can be applied. The rules verify whether the payment object and the content of the payment amount are correct and legal. The verification rule (agreed in advance and known to the system) is to verify the verification code based on the payment object and payment amount information (similar to the last digit of the ID card number, which is calculated based on the previous information. If the collected If the two parts of the number do not match, the ID number is wrong), if it fails to pass the verification, it means that the content has been tampered with. Then, when verifying whether the identified payment platform entrance has been certified, a third party can be entrusted to ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com